Organizational Ethical Analysis Paper

 write a research paper on an organization of choice (5-7 pages minimum).  The organizational analysis will utilize a minimum of five external, peer-reviewed academic sources and contain the following sections: 

.      What is the organization and how would you describe it?

·      Who are the leaders of the organization?

·      Is the organization successful?

·      How do you determine whether an organization is ethical or not?

·      Based on your assessment and research, is the organization ethical?

·      What would you change about the organization to make it better, without sacrificing ethical standards?

final Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.

Case Study

Complete the attached case study.

Follow all directions and answer all of the questions located at the end of the case study.

Download the attached risk analysis template to use as your complete your case study. 

foler

discussion

 

We have looked at how to create links to pages that are internal to our site as well as external links to other pages. This week, we’re going to discuss hyperlinks for our own site as well as other sites online. Consider the following questions:

  • How does your file structure (where your pages are housed on the Web server) effect the code for your links?
  • What is the advantage or disadvantage of having multiple folders for your site?
  • Why is it important to understand the target attribute of the anchor tag?

Demonstrate it: You are developing a site for travel. From the homepage, a visitor wants to view packages for a trip to Japan. Based on the attached file structure and your knowledge of the Internet, write the code for links to the following:

  • Visit Japan
  • Family Friendly Tours
  • Cycling Enthusiast Tours
  • Culinary Based Excursions
  • Weather in Japan for today
  • Currency Exchange Rates

foler

  • Index.html
  • about.html
  • contact.html
  • countries.html*

folder

  • japan.html
  • family.html
  • cycling.html
  • culinary.html

*The countries page has a list of all the countries where the company has established tours.

Assignment

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper – Organizational leader and decision making

 Note: Please make sure read the question properly and No plagiarism and No grammar mistakes and APA 7 format. 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

References to write:

 Required Reading:

Optional Resources: Chapter 3 & 4 Journal articles

Discussion: Computer Crimes

 After reading about the surge of internet computer crimes, discuss the following: How have computer crimes driven changes in information technology security? How does the Fourth Amendment apply to computer crimes? 

RM DISCUSSION-9

 Discussion: Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now).

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

Topic:

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

Data visualization

 

Data: Simple Graphs in RStudio

Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types.

Assignment:

Graphs to Produce:

Pie Chart:

  • Create a pie chart of the computer ram
  • Label the ram sizes as follows: 2GB, 4GB, 8GB, 16GB, 24GB, 32GB
  • Title the pie chart as “Computer Ram”
  • Color the pie chart using the rainbow option

Bar Plot:

  • Create a barplot of the computer screen sizes
  • Label the x axis as “Screen Sizes”
  • Label the y axis as “Frequency”
  • Title the barplot as “Computer Screen Sizes”
  • Color the bars in the barplot any color you wish.

Histogram:

  • Create a histogram of the computer prices
  • Label the x axis as “Prices”
  • Title the histogram as “Computer Prices”
  • Give the histogram any color you wish.

Box Plot:

  • Create a boxplot of the comparing the computer price and premium category
  • Label the y axis as “Price”
  • Label the x axis as “Premium”
  • Title the boxplot as “Premium Computer Prices Distribution”
  • Color the boxplot any color you wish.

Scatter Plot:

  • Create a scatter plot of computer price and hard drive size
  • Label the x axis as “Hard Drive Size”
  • Label the y axis as “Price”
  • Title the scatter plot as “Computer Price vs Hard Drive Size”
  • Color the scatter any color you wish.

Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.